Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe
-
Size
59KB
-
MD5
5103fcc2a0f5300d9da6ac34765e37be
-
SHA1
967f035c66b65ea44362b64f8d1e104a9fbf0208
-
SHA256
424d033e34dc7b1e3c8b74c1bdfebeb9edb8d2542a6bcb2925b4c71074a176fd
-
SHA512
046e8ab024b11ca682ce5c6c9242c5fb8f001ac587708193a4dc45265228193a010170473c4244a65ee50bd41911f8ed7fd6080cecfbae7b4c074f6d92ff751c
-
SSDEEP
768:n5mhew0GpSyMe6hwUkdwJzh+qciaQRENEzxZbARtR06g2wqp4YPeznellmqGwxPw:nK0GjMeQG3iaQREuVZ6ro29p4YxbKd9l
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2080 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 1940 biudfw.exe -
Loads dropped DLL 1 IoCs
Processes:
5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exepid process 2224 5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exedescription pid process target process PID 2224 wrote to memory of 1940 2224 5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe biudfw.exe PID 2224 wrote to memory of 1940 2224 5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe biudfw.exe PID 2224 wrote to memory of 1940 2224 5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe biudfw.exe PID 2224 wrote to memory of 1940 2224 5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe biudfw.exe PID 2224 wrote to memory of 2080 2224 5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe cmd.exe PID 2224 wrote to memory of 2080 2224 5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe cmd.exe PID 2224 wrote to memory of 2080 2224 5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe cmd.exe PID 2224 wrote to memory of 2080 2224 5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5103fcc2a0f5300d9da6ac34765e37be_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:1940
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5fad7af46c032a53813b43148d6ac3fb9
SHA1a60eaa25d75a22573ed06ba2f0b34b64bc3bbee2
SHA256dd72aaabccc9ef04a234978422339efed7c5cab23d4e0c34074fd214428a82d0
SHA512b4d4a7ce736e3890c6f107ef75c73d840db18609d1ea3aa436e1a21f51277b5d066b2ecb2e4a372ed197c623c18c0db3adb13339e2e4b926acabf957098c566e
-
Filesize
512B
MD555e10a9af74d3f3fa5ae3cb7ff5ad9d4
SHA1449221fd8d7196a54de2bd583625d8d1b64db56a
SHA256a945a44cfe50423c01f26a16445ed177a347052e791364a9cb7de6bcaa18f3c1
SHA5124af5ba74467b4c61302ea9571f19346c05f911843f2c6153fcd9a7340f9bc6e1f8867cdb72ec7ba0dc4930199aa5c302711ad5da9fd35241839418f6e70a515a
-
Filesize
302B
MD5670d593b7740880f6f4f188b1102e2bc
SHA11c137a460ad02daf44ddea915b885c8f36654699
SHA25638bae063992d123c6e19fcdd578e2621ed467231e0b5977eb911e43078bef136
SHA512a7e78f7ea1a4cb69fe50589c14e42124a9d3c028aa82a313e6777f50baaad5f15a09fe2e2ea150f2ccef436165788952bb1a87be70b516c505ee230731536e11